Static task
static1
Behavioral task
behavioral1
Sample
1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1824dae8adaa95fb4246042076d33aa2_JaffaCakes118
-
Size
265KB
-
MD5
1824dae8adaa95fb4246042076d33aa2
-
SHA1
6141db8de375b43db72504b71aecb7c1f1ec4dbf
-
SHA256
651c648966193c6558da3a02ae818af8253ca2e86f85d828e76b22c62078996b
-
SHA512
02f507c594563e698f95e8dc7c11a4d14eb9922913838f9ca59bc56e43d9816571f92493ca0decb12bc0a1ca39719e7b2ac8090e0b6d701117d4f66b9f8d01b9
-
SSDEEP
6144:otwVI56dl2hi8u6D/2/9GrLmZlcjh8hsJAiAjZvPzjrBEk0oxAOx:Uc2hi8nDe/9mclzhsJujBPzjrBEv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1824dae8adaa95fb4246042076d33aa2_JaffaCakes118
Files
-
1824dae8adaa95fb4246042076d33aa2_JaffaCakes118.exe windows:4 windows x86 arch:x86
5dd0a1e79c630a767ce2449a0c4acb91
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winspool.drv
ClosePrinter
DeletePrintProvidorA
DocumentPropertiesA
OpenPrinterA
advapi32
LsaSetSystemAccessAccount
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
LsaGetSystemAccessAccount
RegCloseKey
gdi32
TextOutA
SetWindowExtEx
SetViewportOrgEx
DPtoLP
DeleteDC
DeleteObject
Escape
ExtCreatePen
ExtTextOutA
GetBkColor
GetClipBox
GetDeviceCaps
GetObjectA
GetStockObject
GetTextColor
GetViewportExtEx
GetWindowExtEx
LPtoDP
OffsetViewportOrgEx
PtVisible
RectVisible
Rectangle
RemoveFontResourceA
RestoreDC
SaveDC
ScaleViewportExtEx
ScaleWindowExtEx
SetBkColor
SetMapMode
SetTextColor
SetViewportExtEx
oleaut32
VariantTimeToSystemTime
VariantCopy
VariantClear
VariantChangeType
VarBstrFromDate
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocStringByteLen
SysAllocString
OleCreateFontIndirect
kernel32
lstrlenW
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
WritePrivateProfileStringA
WinExec
WideCharToMultiByte
WaitNamedPipeW
VirtualFree
VirtualAlloc
UnlockFile
TlsSetValue
CloseHandle
CompareStringA
CompareStringW
CreateFileA
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
FileTimeToSystemTime
FindClose
FindResourceA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetComputerNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStringsW
GetFileAttributesA
GetFileTime
GetFileType
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessVersion
GetShortPathNameA
GetStartupInfoA
GetStringTypeA
GetStringTypeW
GetTempPathA
GetThreadLocale
GetTimeZoneInformation
GetVersion
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFlags
GlobalFree
GlobalGetAtomNameA
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockFile
LockResource
MulDiv
MultiByteToWideChar
Process32Next
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetErrorMode
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
comdlg32
ChooseColorA
ChooseFontW
FindTextA
FindTextW
GetFileTitleA
GetFileTitleW
GetOpenFileNameA
PrintDlgExA
ChooseColorW
ole32
CoRegisterMessageFilter
StringFromCLSID
CoRevokeClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
OleFlushClipboard
OleInitialize
OleIsCurrentClipboard
OleUninitialize
StgCreateDocfileOnILockBytes
CoFreeUnusedLibraries
StgOpenStorageOnILockBytes
CoGetClassObject
oledlg
ord2
ord8
user32
wsprintfA
WinHelpA
ValidateRect
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TabbedTextOutA
SystemParametersInfoA
SetWindowsHookExA
SetWindowTextA
SetWindowPos
SetWindowLongA
SetWindowContextHelpId
SetRect
SetPropA
SetMenuItemBitmaps
SetForegroundWindow
SetFocus
SetCursor
SetActiveWindow
SendMessageA
SendDlgItemMessageA
RemovePropA
ReleaseDC
RegisterWindowMessageA
RegisterClassA
RedrawWindow
PtInRect
PostThreadMessageA
PostQuitMessage
PostMessageA
AdjustWindowRectEx
CallNextHookEx
CallWindowProcA
CharNextA
CharUpperA
CheckMenuItem
ClientToScreen
CreateDialogIndirectParamA
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DispatchMessageA
DlgDirListComboBoxA
DrawTextA
EnableMenuItem
EnableWindow
EndDialog
GetActiveWindow
GetCapture
GetClassInfoA
GetClassLongA
GetClassNameA
GetClientRect
GetCursorPos
GetDC
GetDlgCtrlID
GetDlgItem
GetFocus
GetForegroundWindow
GetKeyState
GetMenu
GetMenuCheckMarkDimensions
GetMenuItemCount
GetMenuItemID
GetMessageA
GetMessagePos
GetNextDlgGroupItem
GetNextDlgTabItem
GetParent
GetPropA
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMetrics
GetTopWindow
GetWindow
GetWindowDC
GetWindowLongA
GetWindowPlacement
GetWindowTextA
GrayStringA
IsChild
IsIconic
IsWindow
IsWindowEnabled
LoadBitmapA
LoadCursorA
LoadIconA
LoadStringA
MapDialogRect
MapWindowPoints
MessageBeep
MessageBoxA
ModifyMenuA
MoveWindow
OffsetRect
PeekMessageA
comctl32
ord17
Sections
.text Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 145KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ